Detects when multiple hosts are using the same agent ID. This could occur in the event of an agent being taken over and used to inject illegitimate documents into an instance as an attempt to spoof events in order to masquerade actual activity to evade detection.
Rule type: threshold
Risk score: 73
Runs every: 5m
Maximum alerts per execution: 100
- Threat Detection
- Defense Evasion
Rule license: Elastic License v2